DirtyDecrypt Exploit Code Hits Public: Linux Kernel LPE Flaw Now Weaponized

By

Urgent: Proof-of-Concept Exploit Released for Linux Kernel Privilege Escalation Bug

Security researchers have released a working proof-of-concept (PoC) exploit for a critical Linux kernel vulnerability, CVE-2026-31635, that allows local attackers to gain root privileges. The exploit, dubbed DirtyDecrypt (also known as DirtyCBC), was posted to public code repositories earlier today.

DirtyDecrypt Exploit Code Hits Public: Linux Kernel LPE Flaw Now Weaponized
Source: feeds.feedburner.com

The flaw resides in the kernel's memory management subsystem and can be triggered by unprivileged users to elevate their system access. “This exploit turns a local user into a complete root-level attacker within seconds,” said Dr. Alina Torres, a vulnerability researcher at Zellic Security, which co-discovered the bug.

What We Know So Far

The Zellic and V12 security team originally reported the vulnerability on May 9, 2026. Shortly after, Linux kernel maintainers informed them that the issue had already been disclosed and patched in an earlier update. “It was a duplicate – but that doesn’t reduce the danger for unpatched systems,” Torres added.

Despite the patch being available for several weeks, many enterprise and personal devices remain unhardened. The public release of DirtyDecrypt significantly raises the stakes for administrators who have delayed updates.

Background

The Linux kernel has long been a target for privilege escalation exploits. DirtyDecrypt belongs to a family of attacks that manipulate memory corruption to bypass security checks. The vulnerability was assigned CVE-2026-31635 and affects kernel versions 6.1 through 6.8 (patched in 6.8.5+).

Notably, the flaw is similar in spirit to the famous Dirty Pipe (CVE-2022-0847) and Dirty COW (CVE-2016-5195) exploits – but uses a different vector related to CBC (Cipher Block Chaining) modes in kernel crypto routines, hence the name DirtyCBC.

DirtyDecrypt Exploit Code Hits Public: Linux Kernel LPE Flaw Now Weaponized
Source: feeds.feedburner.com

What This Means

Administrators must treat this as a critical priority. Any system running an unpatched Linux kernel is at risk of full compromise, especially in multi-user environments like servers, containers, and cloud workloads.

Security firm V12 issued a statement urging immediate kernel updates: “If you haven’t applied the patch yet, assume you’ve been compromised. DirtyDecrypt gives local users direct root access – no user interaction required beyond gaining initial shell access.”

Mitigation Steps

Technical Details

The exploit leverages a use-after-free bug in the kernel’s crypto_cbc code. By carefully spraying memory and triggering a race condition, an attacker can overwrite their own task credentials and assume root identity.

Torres noted that the PoC is reliable on commodity hardware, making it a dangerous tool for both penetration testers and malicious actors alike.

Tags:

Related Articles

Recommended

Discover More

Dexcom CEO Teases Revolutionary CGM Applications Beyond Diabetes MonitoringGPT-5.5 Arrives on Microsoft Foundry: Enterprise-Ready Frontier IntelligenceAdapting Container Security to NIST's Revised NVD Enrichment ModelChina's AI-Powered Short Dramas and Global Health Setbacks: Key Questions Answered10 Lessons from Braze’s CTO on Building an AI-First Engineering Team